Threat name:
Metasploit, Meterpreter
Alert
Classification:
phis.troj.spyw.evad
Adds extensions / path to Windows Defender exclusion list (Registry)
AI detected malicious Powershell script
Allocates memory in foreign processes
Antivirus detection for dropped file
Blacklisted process start detected (Windows program)
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)
Contains functionality to check if the process is started with administrator privileges
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Microsoft Windows Malicious Software Removal Tool Heartbeat Telemetry
Disable UAC(promptonsecuredesktop)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disable Windows Defender Security Center Settings (registry)
Disables the Smart Screen filter
Disables virtualization based memory integrity
Disables Windows Defender (deletes autostart)
Disables Windows Defender Tamper protection
Encrypted powershell cmdline option found
Found malware configuration
Found pyInstaller with non standard icon
Found suspicious powershell code related to unpacking or dynamic code loading
Found suspicious ZIP file
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies controlled folder access of windows defender exploit guard
Modifies security policies related information
Modifies Windows Defender signatures updates days
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Execution from Suspicious Folder
Sigma detected: Execution of Powershell Script in Public Folder
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Malicious Base64 Encoded PowerShell Keywords in Command Lines
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Uses bcdedit to modify the Windows boot settings
Uses known network protocols on non-standard ports
Uses regedit.exe to modify the Windows registry
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Metasploit Payload
Yara detected MetasploitPayload
Yara detected Meterpreter
Yara detected Powershell download and execute
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1759441
Sample:
4nSoi8xhY4.exe
Startdate:
18/08/2025
Architecture:
WINDOWS
Score:
100
165
Suricata IDS alerts
for network traffic
2->165
167
Found malware configuration
2->167
169
Malicious sample detected
(through community Yara
rule)
2->169
171
25 other signatures
2->171
14
4nSoi8xhY4.exe
1001
2->14
started
18
winfirewall.exe
2->18
started
20
svchost.exe
2->20
started
23
rundll32.exe
2->23
started
process3
dnsIp4
153
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
14->153
dropped
155
C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+
14->155
dropped
157
C:\Users\user\AppData\Local\...\tk86t.dll, PE32+
14->157
dropped
159
51 other malicious files
14->159
dropped
251
Suspicious powershell
command line found
14->251
253
Bypasses PowerShell
execution policy
14->253
255
Found pyInstaller with
non standard icon
14->255
25
4nSoi8xhY4.exe
14->25
started
257
Writes to foreign memory
regions
18->257
259
Allocates memory in
foreign processes
18->259
261
Creates a thread in
another existing process
(thread injection)
18->261
263
Injects a PE file into
a foreign processes
18->263
27
svchost.exe
18->27
started
163
127.0.0.1
unknown
unknown
20->163
file5
signatures6
process7
process8
29
powershell.exe
25->29
started
33
cmd.exe
1
25->33
started
35
cmd.exe
1
25->35
started
37
cmd.exe
25->37
started
file9
147
C:\Users\Public\Documents\...\PowerRun.exe, PE32+
29->147
dropped
149
C:\Users\Public\Documents\...\Script_Run.bat, DOS
29->149
dropped
151
C:\Users\Public\...\WindowsSettings.zip, Zip
29->151
dropped
241
Loading BitLocker PowerShell
Module
29->241
39
cmd.exe
29->39
started
42
conhost.exe
29->42
started
44
cmd.exe
1
33->44
started
46
conhost.exe
33->46
started
243
Suspicious powershell
command line found
35->243
245
Encrypted powershell
cmdline option found
35->245
247
Uses schtasks.exe or
at.exe to add and modify
task schedules
35->247
249
Uses bcdedit to modify
the Windows boot settings
35->249
48
cmd.exe
1
35->48
started
50
conhost.exe
35->50
started
52
cmd.exe
37->52
started
54
conhost.exe
37->54
started
signatures10
process11
signatures12
203
Uses bcdedit to modify
the Windows boot settings
39->203
56
powershell.exe
39->56
started
60
PowerRun.exe
39->60
started
62
PowerRun.exe
39->62
started
71
6 other processes
39->71
205
Suspicious powershell
command line found
44->205
64
powershell.exe
22
44->64
started
67
powershell.exe
14
20
48->67
started
207
Encrypted powershell
cmdline option found
52->207
69
powershell.exe
52->69
started
process13
dnsIp14
135
C:\Users\user\AppData\...\WimProvider.dll.mui, PE32
56->135
dropped
137
C:\Users\user\AppData\...\VhdProvider.dll.mui, PE32
56->137
dropped
139
C:\Users\user\...\UnattendProvider.dll.mui, PE32
56->139
dropped
145
47 other malicious files
56->145
dropped
209
Loading BitLocker PowerShell
Module
56->209
73
DismHost.exe
56->73
started
75
Dism.exe
56->75
started
211
Multi AV Scanner detection
for dropped file
60->211
213
Uses regedit.exe to
modify the Windows registry
60->213
77
PowerRun.exe
60->77
started
79
PowerRun.exe
62->79
started
161
5.83.218.183, 4670, 49696, 49697
BRIGHTBOX-ASGB
United Kingdom
64->161
141
C:\Users\Public\Documents\WindowsScreen.exe, PE32+
64->141
dropped
81
WindowsScreen.exe
64->81
started
143
C:\Users\Public\Documents\svhost.exe, PE32+
67->143
dropped
215
Suspicious powershell
command line found
67->215
217
Obfuscated command line
found
67->217
219
Found suspicious powershell
code related to unpacking
or dynamic code loading
67->219
221
Powershell drops PE
file
67->221
85
svhost.exe
67->85
started
87
powershell.exe
69->87
started
223
Disables Windows Defender
(deletes autostart)
71->223
89
PowerRun.exe
71->89
started
91
Conhost.exe
71->91
started
file15
signatures16
process17
file18
93
PowerRun.exe
77->93
started
95
PowerRun.exe
79->95
started
125
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
81->125
dropped
127
C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+
81->127
dropped
129
C:\Users\user\AppData\Local\...\select.pyd, PE32+
81->129
dropped
131
46 other malicious files
81->131
dropped
173
Multi AV Scanner detection
for dropped file
81->173
175
Found pyInstaller with
non standard icon
81->175
97
WindowsScreen.exe
81->97
started
177
Antivirus detection
for dropped file
85->177
179
Writes to foreign memory
regions
85->179
181
Allocates memory in
foreign processes
85->181
183
2 other signatures
85->183
101
svchost.exe
85->101
started
103
conhost.exe
87->103
started
signatures19
process20
file21
105
regedit.exe
93->105
started
108
regedit.exe
95->108
started
133
C:\Users\user\AppData\...\winfirewall.exe, PE32+
97->133
dropped
185
Creates an undocumented
autostart registry key
97->185
110
cmd.exe
97->110
started
112
cmd.exe
97->112
started
187
Contains functionality
to change the desktop
window for a process
(likely to hide graphical
interactions)
101->187
189
Contains functionality
to inject threads in
other processes
101->189
191
Contains functionality
to inject code into
remote processes
101->191
193
Contains functionality
to check if the process
is started with administrator
privileges
101->193
signatures22
process23
signatures24
225
Changes security center
settings (notifications,
updates, antivirus,
firewall)
105->225
227
Changes the view of
files in windows explorer
(hidden files and folders)
105->227
229
Blacklisted process
start detected (Windows
program)
105->229
237
7 other signatures
105->237
231
Disables virtualization
based memory integrity
108->231
233
Disable Microsoft Windows
Malicious Software Removal
Tool Heartbeat Telemetry
108->233
235
Disables the Smart Screen
filter
108->235
239
3 other signatures
108->239
114
winfirewall.exe
110->114
started
117
conhost.exe
110->117
started
119
conhost.exe
112->119
started
121
schtasks.exe
112->121
started
process25
signatures26
195
Writes to foreign memory
regions
114->195
197
Allocates memory in
foreign processes
114->197
199
Creates a thread in
another existing process
(thread injection)
114->199
201
Injects a PE file into
a foreign processes
114->201
123
svchost.exe
114->123
started
process27
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.